EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"cryptographic hash functions"
Narrow search

Narrow search

Year of publication
Subject
All
ARM Cortex-M4 1 Cryptographic Hash Functions 1 Cycles per Byte 1 Data security 1 Datensicherheit 1 Digitalisierung 1 Digitization 1 E-commerce 1 Electronic Commerce 1 Infrastructure 1 Infrastructure investment 1 Infrastruktur 1 Infrastrukturinvestition 1 KSI 1 PKI 1 Performance Evaluation 1 SHA-3 1 Welt 1 World 1 cryptographic hash functions 1 digital signatures 1 digital time-stamping 1 keyless signature infrastructure 1 post-quantum security 1 public key infrastructure 1
more ... less ...
Online availability
All
Undetermined 1
Type of publication
All
Article 2
Type of publication (narrower categories)
All
Article in journal 1 Aufsatz in Zeitschrift 1
Language
All
English 2
Author
All
Buldas, Ahto 1 Ganesan, Geetha 1 Laanoja, Risto 1 Sobti, Rajeev 1 Truu, Ahto 1
Published in...
All
International Journal of Information Security and Privacy (IJISP) 1 International journal of services technology and management 1
Source
All
ECONIS (ZBW) 1 Other ZBW resources 1
Showing 1 - 2 of 2
Cover Image
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor
Sobti, Rajeev; Ganesan, Geetha - In: International Journal of Information Security and … 12 (2018) 1, pp. 63-73
SHA-3 was an open competition initiated by NIST to design new generation of hash functions. This competition was a necessity to overcome the challenges imposed by multiple attacks on MDx family of hash functions including SHA-0 and SHA-1. For this competition, NIST announced a reference platform...
Persistent link: https://www.econbiz.de/10012045709
Saved in:
Cover Image
Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum world
Buldas, Ahto; Laanoja, Risto; Truu, Ahto - In: International journal of services technology and management 23 (2017) 1/2, pp. 117-130
Persistent link: https://www.econbiz.de/10011773469
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...